Solved

Controling Sony EVI-D31

Posted on 1998-03-21
8
948 Views
Last Modified: 2008-02-01
We are trying to write a Delphi program to control the Sony EVI-D31 camera. We have a list of the codes but do not know how to output them to the camera. This is for an urgent project. Please help!!!!
0
Comment
Question by:jsutton290
  • 5
  • 2
8 Comments
 
LVL 8

Expert Comment

by:ZifNab
ID: 1360672
How is your camera connected to the computer? Have you got the protocol?
0
 

Author Comment

by:jsutton290
ID: 1360673
The camera is connected to the VISCA IN socket on the camera by a cable from COM2 on the PC. We have a complete listing of the control codes but we can not output them from the com port. We have tried a number of Delphi components but they only seem to work when outputting text strings. We need to output Hex values of the type $88010604FF. Any hints will be gratefully received.
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1360674
I don't know, but have you tried comm-port component of M.Cocco? If this one doesn't work, we've to find something else...
E-mail: d3k@mdnet.it
URL   : http://www.mdlive.com/d3k/
Regards, Zif.
0
 

Author Comment

by:jsutton290
ID: 1360675
Hi Zif.
I am actually using Marco Coccos CommportDriver component and he has sent me some very good advice. I can now send commands to the camera and control its movement but I am having trouble capturing the cameras response to a Pan/Tilt enquiry command. The camera responds with an 11 byte code which I am trying to capture in an array. The problem arises because the camera responses are of different lengths. The only responses that I want to capture are 7 bytes and 11 bytes long, I want to ignore all the rest. I tried an array of fixed length but end up with the problem of different data packets from the camera overwriting the array positions when using an OnRXData event. I thought of using the ReadByte method (therefore avaoiding using the OnRXData event) but I am not sure how to use it. Any ideas?
Regards
John Sutton
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 8

Expert Comment

by:ZifNab
ID: 1360676
Great, you can communicate with the camera! So, problem is solved and I get the points and you ask a new question ............... ;-)))))))))))))))))))))))))))))
Just kidding, hope you don't mind, even if it's such bad humor.
Doesn't the camera sends an end character after each command send back?
I 've communicated also with a device and this one always sendend some bytes which defined the end (eg. #13#10#13). I used an ONData event and filled the recieved chars into a longstring. If I received a end string I knew this was the end and so I always had the correct command or result. So to give a comment on your question : How do you know when a data pack is ended and the rest of the bytes are the results of a knew command?

PS. What are you making? Can I see the result once?

Regards, ZiF.

0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1360677
Hi jsutton290,

I don't hear anything from you anymore? What's the problem?
Is everything going all right?

Regards, Zif.
0
 
LVL 8

Accepted Solution

by:
ZifNab earned 100 total points
ID: 1360678
Hi jsutton290,

I'm answering this question, because I presume you solved your problem with using the component I proposed. If this isn't the case, just reject my answer and give a comment along... so we still can help you further....

Regards, Zif.
0
 

Expert Comment

by:qlong
ID: 5449381
jsutton290 ,can you tell me the list of the codes of EVI-D31 and connection level  between computer serial port and EVI-D31,example 1 to 1 or 1 to 6 .Now I want to write a programme with C++Builder to control the camera.Thank you!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now